Ahmed Al-Gindy - Academia.edu (original) (raw)

Papers by Ahmed Al-Gindy

Research paper thumbnail of RF LNA with Simultaneous Noise-Cancellation and Distortion-Cancellation for Wireless RF Systems

2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA)

Research paper thumbnail of Towards an ML-based semantic IoT for pandemic management: A survey of enabling technologies for COVID-19

Research paper thumbnail of A new watermarking scheme for digital videos using DCT

Open Computer Science

With the advent of high-speed broadband Internet access, the need to protect digital videos is hi... more With the advent of high-speed broadband Internet access, the need to protect digital videos is highly recommended. The main objective of this study is to propose an adaptive algorithm for watermarked digital videos in the frequency domain based on discrete cosine transform (DCT). The watermark signature image is embedded into the whole frame of the video. The green channel of the RGB frame is selected for the embedding process using the DCT algorithm as it shows the recommended quality of the watermarked frames. The experiment results indicate that the proposed algorithm shows robustness and high quality of the watermarked videos by testing various strength values ∆ for different videos. It offers resistance against different types of attacks.

Research paper thumbnail of Integrating Digital Technology in Enterprise and Entrepreneurship Education

Technology and Entrepreneurship Education, 2022

Research paper thumbnail of Autoencoder-based Intrusion Detection System

2021 International Conference on Engineering and Emerging Technologies (ICEET), 2021

Given the dependence of the modern society on networks, the importance of effective intrusion det... more Given the dependence of the modern society on networks, the importance of effective intrusion detection systems (IDS) cannot be underestimated. In this paper, we consider an autoencoder-based IDS for detecting distributed denial of service attacks (DDoS). The advantage of autoencoders over traditional machine learning methods is the ability to train on unlabeled data. As a result, autoencoders are well-suited for detecting unknown attacks. The key idea of the proposed approach is that anomalous traffic flows will have higher reconstruction loss which can be used to flag the intrusions. The results of numerical experiments show that the proposed method outperforms benchmark unsupervised algorithms in detecting DDoS attacks.

Research paper thumbnail of Conceptualizing Smart Sustainable Cities: Crossing Visions and Utilizing Resources in Africa

International Journal of Advanced Computer Science and Applications, 2021

Research paper thumbnail of RF LNA with Active Inductor Linearizer for Wireless Communication

2021 International Symposium on Networks, Computers and Communications (ISNCC), 2021

This paper presents the design of a fully-integrated RF low noise amplifier with active inductor ... more This paper presents the design of a fully-integrated RF low noise amplifier with active inductor linearizer. The proposed circuit achieves 16 dBc of third order intermodulation IM3 distortion cancellation at 1.9 GHz with 8 dB third-order intercept point IP3 improvement. The proposed circuit utilize an active inductor linearizer to improve linearity of the circuit and offering tunability. The simulation results show an overall proposed circuit peak gain is 14.5 dB and the minimum noise Figure is 0.75 dB at 1.9 GHz frequency with power consumption of 7.4 mA.

Research paper thumbnail of Optimal Charging/Discharging Decision of Energy Storage Community in Grid-Connected Microgrid Using Multi-Objective Hunger Game Search Optimizer

Research paper thumbnail of Virtual Reality: Development of an Integrated Learning Environment for Education

International Journal of Information and Education Technology, 2020

Research paper thumbnail of Three Levels Dwt Watermarking Technique for Color Images and Watermarks

International Journal of Recent Technology and Engineering (IJRTE), 2019

This paper presents a three-levels Discrete Wavelet Transform (DWT) watermarking technique for co... more This paper presents a three-levels Discrete Wavelet Transform (DWT) watermarking technique for color images and watermarks. The proposed technique utilizes embedding the RGB watermark information into the Y channel of the YCbCr cover image. A pre-processor is used to convert the color watermark from RGB to a binary sequence. The pre-processed output is, then, inserted several times into the Y channel of the YCbCr cover image by changing the LL3 DWT coefficients. The robustness of the proposed scheme is verified through the ability to resist several classical attacks such as scaling, cropping, JPEG compression, median filtering and low pass filtering. In addition, the proposed scheme does not need the original host image to recover the watermark; hence, the recovery method is blind. This paper also includes a qualitative comparison between the one-level and two-levels DWT.

Research paper thumbnail of DCT Watermarking Technique Using Image Normalization

2015 International Conference on Developments of E-Systems Engineering (DeSE), 2015

This paper presents a modified algorithm for colour digital image watermarking. The 24 bits/pixel... more This paper presents a modified algorithm for colour digital image watermarking. The 24 bits/pixel RGB images are used and the watermark is placed on the green channel of the RGB image. The embedding and extraction processes have been carried out using the discrete cosine transform DCT. Image normalization process has been integrated and used to improve the robustness against geometric attacks. Handwritten signature has been used as a watermark and embedded into the host image using different watermarking strengths. Comparison between the original and modified algorithm is presented. Experimental results show that the normalization process has been useful to overcome the drawbacks in the original algorithm and improve robustness against geometric attacks such as translation, rotation, and scaling.

Research paper thumbnail of RF LNA with Simultaneous Noise-Cancellation and Distortion-Cancellation for Wireless RF Systems

2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA)

Research paper thumbnail of Towards an ML-based semantic IoT for pandemic management: A survey of enabling technologies for COVID-19

Research paper thumbnail of A new watermarking scheme for digital videos using DCT

Open Computer Science

With the advent of high-speed broadband Internet access, the need to protect digital videos is hi... more With the advent of high-speed broadband Internet access, the need to protect digital videos is highly recommended. The main objective of this study is to propose an adaptive algorithm for watermarked digital videos in the frequency domain based on discrete cosine transform (DCT). The watermark signature image is embedded into the whole frame of the video. The green channel of the RGB frame is selected for the embedding process using the DCT algorithm as it shows the recommended quality of the watermarked frames. The experiment results indicate that the proposed algorithm shows robustness and high quality of the watermarked videos by testing various strength values ∆ for different videos. It offers resistance against different types of attacks.

Research paper thumbnail of Integrating Digital Technology in Enterprise and Entrepreneurship Education

Technology and Entrepreneurship Education, 2022

Research paper thumbnail of Autoencoder-based Intrusion Detection System

2021 International Conference on Engineering and Emerging Technologies (ICEET), 2021

Given the dependence of the modern society on networks, the importance of effective intrusion det... more Given the dependence of the modern society on networks, the importance of effective intrusion detection systems (IDS) cannot be underestimated. In this paper, we consider an autoencoder-based IDS for detecting distributed denial of service attacks (DDoS). The advantage of autoencoders over traditional machine learning methods is the ability to train on unlabeled data. As a result, autoencoders are well-suited for detecting unknown attacks. The key idea of the proposed approach is that anomalous traffic flows will have higher reconstruction loss which can be used to flag the intrusions. The results of numerical experiments show that the proposed method outperforms benchmark unsupervised algorithms in detecting DDoS attacks.

Research paper thumbnail of Conceptualizing Smart Sustainable Cities: Crossing Visions and Utilizing Resources in Africa

International Journal of Advanced Computer Science and Applications, 2021

Research paper thumbnail of RF LNA with Active Inductor Linearizer for Wireless Communication

2021 International Symposium on Networks, Computers and Communications (ISNCC), 2021

This paper presents the design of a fully-integrated RF low noise amplifier with active inductor ... more This paper presents the design of a fully-integrated RF low noise amplifier with active inductor linearizer. The proposed circuit achieves 16 dBc of third order intermodulation IM3 distortion cancellation at 1.9 GHz with 8 dB third-order intercept point IP3 improvement. The proposed circuit utilize an active inductor linearizer to improve linearity of the circuit and offering tunability. The simulation results show an overall proposed circuit peak gain is 14.5 dB and the minimum noise Figure is 0.75 dB at 1.9 GHz frequency with power consumption of 7.4 mA.

Research paper thumbnail of Optimal Charging/Discharging Decision of Energy Storage Community in Grid-Connected Microgrid Using Multi-Objective Hunger Game Search Optimizer

Research paper thumbnail of Virtual Reality: Development of an Integrated Learning Environment for Education

International Journal of Information and Education Technology, 2020

Research paper thumbnail of Three Levels Dwt Watermarking Technique for Color Images and Watermarks

International Journal of Recent Technology and Engineering (IJRTE), 2019

This paper presents a three-levels Discrete Wavelet Transform (DWT) watermarking technique for co... more This paper presents a three-levels Discrete Wavelet Transform (DWT) watermarking technique for color images and watermarks. The proposed technique utilizes embedding the RGB watermark information into the Y channel of the YCbCr cover image. A pre-processor is used to convert the color watermark from RGB to a binary sequence. The pre-processed output is, then, inserted several times into the Y channel of the YCbCr cover image by changing the LL3 DWT coefficients. The robustness of the proposed scheme is verified through the ability to resist several classical attacks such as scaling, cropping, JPEG compression, median filtering and low pass filtering. In addition, the proposed scheme does not need the original host image to recover the watermark; hence, the recovery method is blind. This paper also includes a qualitative comparison between the one-level and two-levels DWT.

Research paper thumbnail of DCT Watermarking Technique Using Image Normalization

2015 International Conference on Developments of E-Systems Engineering (DeSE), 2015

This paper presents a modified algorithm for colour digital image watermarking. The 24 bits/pixel... more This paper presents a modified algorithm for colour digital image watermarking. The 24 bits/pixel RGB images are used and the watermark is placed on the green channel of the RGB image. The embedding and extraction processes have been carried out using the discrete cosine transform DCT. Image normalization process has been integrated and used to improve the robustness against geometric attacks. Handwritten signature has been used as a watermark and embedded into the host image using different watermarking strengths. Comparison between the original and modified algorithm is presented. Experimental results show that the normalization process has been useful to overcome the drawbacks in the original algorithm and improve robustness against geometric attacks such as translation, rotation, and scaling.